Alessandro Vesely wrote in
 <319a066f-5719-4569-8e5e-3d46cef5b...@tana.it>:
 |On Thu 07/Nov/2024 01:26:46 +0100 Bron Gondwana wrote:
 |> I think now is an ideal time to re-start this work at the IETF.  \
 |> The design is 
 |> still evolving and there's plenty of space for an IETF working group \
 |> to improve 
 |> it further, yet it's also had enough design work put in by people with 
 |> operational experience that we have implementers who think they can \
 |> make it 
 |> work at scale.
 |
 |The design is very cute, as it aims to fixing all the difficulties that 
 |domain-based email authentication currently shows.  I'm looking forward to 
 |reading new discussions on this list.
 |
 |However, I'm a bit puzzled by the features that look difficult to implem\
 |ent 
 |inside a "classic" filter module.  It seems that the MTA has to handle \
 |some 
 |situations natively (multiple recipients, bounces).  This implies the \
 |time to 
 |market won't be short.  So, while we work on DKIM2, we shouldn't stop 

Fwiw i will post two drafts as envisioned in March 2023 and then
on 2024-05-30 with the message

  https://mailarchive.ietf.org/arch/msg/ietf-dkim/DuinnZFuaFaKughaXSxkYwtRjMw
and fixup
  https://mailarchive.ietf.org/arch/msg/ietf-dkim/KvlqUCMEf5wnkuK6TiXws61RBeQ

Funnily i said

  Because in the end noone would like to duplicate all the headers
  (that have changed) plus the body etc, even comprimized, on each
  station anew, to be able to track it all the way down to the
  originator.

but i really like this possibility to have email
"cryptographically verifiable up to the sender", of course.

The DKIM-Store: draft can very well be used with a future DKIM2
since milter-based and any other non-integrated software
solutions need to pass state from "ingress to egress" in order to
be able to create a diff, say, and the infrastructure should
(imho) be be capable to filter such lengthy data which
accidentally escapes due to, for example, software bugs.

The other draft will be "DKIM, now horny" and will include the
flags "V" as well as "S" to report verification success and thus
replace the overly chatty and then useless
Authentication-Results:, as well as "M" to signal message
modification.
It will require hard SMTP bounces upon verification failure (if so
announced by sender DNS that replaces DMARC), so that the normal
SMTP protocol kicks in to handle such problems.
There are no XML reports: SMTP nows about the RFCs 3461, 3464 and
therefore "Simple Mail Transfer Protocol (SMTP) Service Extension
for Delivery Status Notifications (DSNs)" as well as "An
Extensible Message Format for Delivery Status Notifications", so
it seems absolutely superfluous to add a complete report bypass
mechanism on a domain basis, as the user gets standardized
notifications upon request (and that request my come from the SMTP
administrator even).
It will also include the subsignatures for replay resistance.
In the "M" case it will not be able to restore the original email
content.
But, except for the subsignatures, it should be *very easy* to
implement it in software *fast*.

 |considering easier alternatives that can make ARC more usable for trusted 
 |forwarding and mailing lists, perhaps on a different list.

You cannot warp trust around the corner.

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)
|
|And in Fall, feel "The Dropbear Bard"s ball(s).
|
|The banded bear
|without a care,
|Banged on himself fore'er and e'er
|
|Farewell, dear collar bear

_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to